Articles by SB Team
Security Leader Panel: Nonnegotiables, Challenges, and Endpoint Security in the Age of AI

Join us as a panel of security leaders discuss the challenges facing them today, endpoint security features that are nonnegotiable, and how they use theGartner® Magic Quadrant™to inform their purchasing decisions.

Register to get insights like:

  • How security program priorities have changed in the last year
  • Challenges security leaders are facing
  • How leaders are evaluating tools for their security programs
  • Real-world security applications of generative and agentic AI

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Speakers:

Ryan Priest

CIO, Verto

John Lemko

Director Of Cybersecurity Operations, Canadian Credit Union

Doug Vondera

Field CISO, SentinelOne

Read More ...
Scaling Zero Trust: Real-World Lessons and Practical Moves

Zero Trust is no longer just a CISO priority, it’s a team effort. Whether you're setting the strategy or executing the details, the challenge is the same: how do you apply Zero Trust without slowing the business down?

This webinar will share what it really takes to scale Zero Trust from aligning stakeholders to strengthening your security posture. We’ll cover how teams are tackling exposure across identities, devices, and data; managing configuration drift; and driving control improvements with the resources they already have. We’ll also show how Reach helps operationalize Zero Trust by prioritizing action, enforcing policy, and validating posture continuously.

Topics include:

  • Where to start: Mapping Zero Trust initiatives to business goals and technical realities
  • Security + usability: Enforcing policies without breaking workflows
  • Making it threat-informed: Adapting controls to evolving attack techniques, not just checklists
  • Posture and configuration: Continuously validating that Zero Trust controls are working as intended
  • Driving change: Overcoming resistance and delivering progress across teams

If you’re working to implement or scale Zero Trust in your organization, this session will help you connect strategy to execution.

Speaker:

Tommy Hui

Tommy Hui

VP of Global Sales Engineering, Reach Security

Tommy is a seasoned cybersecurity professional with extensive experience in helping organizations protect themselves from cyber threats. Currently, at Reach Security,Tommy focuses on empowering businesses to proactively harden their environment with a cutting-edge platform that reduces risk and exposures.

Before joining Reach Security,Tommy led Sales Engineering efforts at Dazz, specializing in unified vulnerability and application security posture management, ensuring organizations could effectively identify and remediate security risks. Prior to that, Tommy helped scale the Sales and Sales Engineering team at SentinelOne leading up to their IPO.

Earlier in his career,Tommy held roles that focused on Network DLP, Security Analytics, and also worked as a DoD employee supporting cryptographic modernization and cyber weapon system program offices. With a deep understanding of cybersecurity technologies and a passion for protecting organizations from emerging threats,Tommy continues to drive innovation and security excellence in the industry.

Read More ...
Identity Under Siege: Strategies for Detecting and Responding to Evolving Identity-Based Threats

Today's cybersecurity landscape is dominated by identity-focused attacks. Identity-driven threats have increased by 156% between 2023 and 2025, now representing 59% of all confirmed threat cases across the eSentire customer base.

In this webinar, James Hastings, Senior Product Manager at eSentire, shares new research from eSentire’s Threat Response Unit that explores how the cybersecurity threat landscape has transformed significantly with identity-based attacks emerging as one of the most dominant threat vectors. We will share how identity-based attacks have evolved from opportunistic attacks to significant Cybercrime-as-a-Service operations that allow attackers to target the foundation of an organization’s security architecture.

The session will explore:

· Observations from real world cases including Phishing-as-a-Service platforms such as Tycoon 2FA that MFA

· The industry sectors are the most exposed to advanced business email compromise phishing attacks

· The role info modern infostealers and malware such as Lumma Stealer play in targeting a range of credentials in SaaS applications, identity services, and browser-stored passwords

· Why traditional security measures can’t detect and respond effectively to these modern identity threats

· A 90-day plan for implementing MDR for Identity techniques to defend against identity-based threats that extend beyond traditional IAM

Read More ...
Subscribe for the Latest News

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Webinars
2026 Security Predictions
Fast, Secure, Resilient: Modernizing Application Security at Scale
Secure Smarter: AI Security at Scale with Shopify, AWS and HackerOne